Security: One (1) internal USB 2.0 connector for security key devices and USB drive keys Power-on password
Administrator's password
Integrated Lights-Out 2 has 12 customizable user accounts and SSL encryption
Integrated Lights-Out 2 can be disabled via a Global Setting
Security: Power-on password
Administrator's password
Integrated Lights-Out has 12 customizable user accounts and SSL encryption
Integrated Lights-Out can be disabled via a Global Setting
Storage Controller: HP Smart Array E200i Controller with 64MB (optional 128 MB battery-backed write cache)
Ethernet Controller: Two (2) embedded NC373i Multifunction Gigabit Server Adapters plus one (1) additional 10/100 network adapter dedicated to iLO 2 Management
Storage Controller: HP Smart Array E200i Controller with 64MB (optional battery-backed write cache)
Ethernet Controller: Two (2) embedded NC373i Multifunction Gigabit Server Adapters plus one (1) additional 10/100 network adapter dedicated to iLO 2 Management
Security: Power-on password
Administrator's password
Integrated Lights-Out 2 has 12 customizable user accounts and SSL encryption
Integrated Lights-Out 2 can be disabled via a Global Setting
Storage Controller: HP Smart Array E200i Controller with 64MB (optional battery-backed write cache)
Ethernet Controller: Two (2) embedded NC373i Multifunction Gigabit Server Adapters plus one (1) additional 10/100 network adapter dedicated to iLO 2 Management
Security: Power-on password
Administrator's password
Integrated Lights-Out has 12 customizable user accounts and SSL encryption
Integrated Lights-Out can be disabled via a Global Setting
Security: Power-on password
Administrator's password
Integrated Lights-Out has 12 customizable user accounts and SSL encryption
Integrated Lights-Out can be disabled via a Global Setting
Workload: Cost-effective, entry-level solution for businesses migrating to servers from PCs or laptops. Designed for core office workloads, like file sharing, print, point of sale, and database applications.
Rack Height: 3U
Security: Cryptographically signed firmware
Data at Rest Encryption (SEDs with local or external key mgmt)
Secure Boot
Secured Component Verification (Hardware integrity check)
Secure Erase
Secured-core server
Silicon Root of Trust
System Lockdown (requires iDRAC9 Enterprise or Datacenter)
TPM 2.0 FIPS, CC-TCG certified, TPM 2.0 China NationZ